Reference Guide

Security Management Server v10.2.11 AdminHelp
Sha256 - The file's 256-character Secure Hash Algorithm can be compared with an expected result to
indicate whether the file has been tampered with.
Score - The threat file's score, indicating the confidence level that the file is malware. The higher the
number, the greater the confidence.
Server Encryption Clients
Suspend an Encrypted Server
When you suspend an encrypted server, you suspend the user associated with the encryption client
rather than an individual user who logs on to the endpoint.
To suspend a Server Encryption client:
1. In the left pane, click Populations > Users.
2. In Search, enter SERVER-USER and click the
.
3. Click the user name of the appropriate user.
4. On the User Detail page, click the Endpoints tab.
5. Click the Device ID of the appropriate endpoint.
6. On the Endpoint Detail page, click the Details & Action tab.
7. In Server Device Control, click Suspend.
Suspension takes effect the next time the endpoint is rebooted.
To reinstate an encrypted server, follow the instructions in Reinstate a Suspended Server Encryption
Client.
Reinstate an Encrypted Server
To reinstate an encrypted server, follow these steps:
1. In the left pane, click Populations > Users.
2. In Search, enter SERVER-USER and click .
3. Click the user name of the appropriate user.
4. On the User Detail page, click the Endpoints tab.
5. Click the Device ID of the appropriate endpoint.
6. On the Endpoint Detail page, click the Details & Action tab.
7. In Server Device Control, click Reinstate.
Reinstatement takes effect the next time the endpoint is rebooted.
Commands for Self-Encrypting Drives
Priority of Commands for Self-Encrypting Drives
Each command for self-encrypting drives has a priority ranking. A command with a higher priority rank
cancels commands of lower priorities in the enforcement queue.
89